December 30, 2016 Karn Ganeshen

[Video] Threat Actor Techniques

Threat Actor Techniques
Presented by Jeremy Junginger at FIRST security conference 2014


This demo presents a realistic attack scenario exhibiting some of the methods and techniques used by threat actors to compromise an internal network, from the Internet.

XSS – Restricted shell – Privileged shell – Hashes – Domain PWN – Network Attacks – Game Over!



Leave a Reply

Your email address will not be published. Required fields are marked *